Cybersecurity Researcher

Herzliya, Tel Aviv District, Israel

Applications have closed

Acronis

Acronis provides award-winning backup software & data protection solutions for consumers, businesses & MSPs. Protect your sensitive information!

View company page

Acronis sets the standard for cyber protection and our mission is to empower people by providing them with cutting edge technology that will enable them to monitor, control, and protect the data that their business’ and lives depend on.

Acronis brings complete cyber protection solutions to its customers. As an automation engineer, you will contribute building and maintaining automated infrastructure to collect, classify and detect cyberthreats like ransomware, malware, viruses and phishing. You will also work closely with our cyber security researchers, building tools to automate their day-to-day operations. Also you will setup monitoring and alerting tools to ensure that our customers always obtain fast and accurate cyber protection.

Every member of our “A-Team” has an instrumental role and impact on the success of Acronis’ business, so we are looking for a highly-motivated individual who thrives in a fast-paced and high-volume, work environment. The ideal candidate for this position will not only possess the skills and experience required but will also possess a positive attitude and ability to solve complex problems and work in a fast-paced and rapidly changing environment. And just like every position at Acronis, the ideal candidate will embody all of our company values: responsive, alert, detail-oriented, makes decisions, and never gives up.

RESPONSIBILITIES:

Perform research in some of the following areas of server and endpoint protection:

  • Vulnerability assessment and configuration assessment;
  • Network security, intrusion detection and protection, including web applications protection;
  • Prevention and detection of attacks that utilize malware/hacktools and targeting Linux/UNIX systems.
  • Develop, support and tune vulnerability, misconfiguration and threat detection rules.
  • Conduct online research of latest cyber threats and ensure it can be prevented/detected with existing technologies. Share research results in blogposts and articles.
  • Analyze suspicious scripts, traffic, websites and their contents both found in the wild or retrieved from customers, adding latest threat detections or fixing false alarms.
  • Design, develop and monitor automation scripts and pipelines to minimize manual efforts required from analysts/researchers.
  • Advise colleagues and customers about real-world attacks and the corresponding detection / prevention countermeasures.

SKILLS & EXPERIENCE:

  • 3+ years of experience in a system administration / system or web development / security audits for some of the following: RHEL (CentOS) / Debian / Ubuntu;
  • Deep understanding of common cyber attack techniques and methods; network protocols; vulnerability and configuration assessment
  • Knowledge of Linux security subsystems, tools and conceptions, including logging abilities
  • Decent skills in configuring at least one of: web / application / database / mail servers running on Linux/UNIX
  • Good interpersonal, written and verbal communication skills
  • Upper-intermediate English

Would be a plus:

  • Technical security certifications like OSCP (the best choice) or CEH or proven experience in security assessments
  • Skills in configuring at least one of: web / application / database / mail servers running on Linux/UNIX
  • Practical skills in security scanners, vulnerability & configuration assessment tools, SIEMs, WAFs, traffic analysis software
  • Background in development security software or routine security task automation
  • Knowledge of OWASP methodologies
  • Skills in programming languages enough for fast PoC creation (Python, shell, etc.)
  • Decent experience with other UNIX operating systems
  • Knowledge of PHP v5+ language
  • Practice in reverse engineering and corresponding methods, techniques and tools
  • Some Machine Learning skills or wish to improve yourself in this area
  • Experience with virtualization, containerization and cloud technologies

Acronis is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, marital status, national origin, physical or mental disability, medical condition, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, gender identity or expression, or any other characteristic protected by applicable laws, regulations and ordinances.

#LI-RK1

Tags: Audits Automation CEH Cloud Debian Intrusion detection Linux Machine Learning Malware Monitoring Network security OSCP OWASP PHP Python Reverse engineering Security assessment Threat detection Ubuntu UNIX

Region: Middle East
Country: Israel
Job stats:  2  0  0
Category: Research Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.